summaryrefslogtreecommitdiff
path: root/source3/selftest
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2011-03-08 14:00:35 +0100
committerGünther Deschner <gd@samba.org>2011-03-08 14:51:18 +0100
commita200bac0937cb2b11147c29b6b490e52a856580f (patch)
tree0df5fb000e81bc987b8a91b3476cec676f19dd95 /source3/selftest
parent1605563b147b0c6223d3aef39e9332faa55574cd (diff)
downloadsamba-a200bac0937cb2b11147c29b6b490e52a856580f.tar.gz
samba-a200bac0937cb2b11147c29b6b490e52a856580f.tar.bz2
samba-a200bac0937cb2b11147c29b6b490e52a856580f.zip
s3-selftest: only run smbtorture4 tests when smbtorture4 is available.
Guenther Autobuild-User: Günther Deschner <gd@samba.org> Autobuild-Date: Tue Mar 8 14:51:18 CET 2011 on sn-devel-104
Diffstat (limited to 'source3/selftest')
-rwxr-xr-xsource3/selftest/tests.py28
1 files changed, 14 insertions, 14 deletions
diff --git a/source3/selftest/tests.py b/source3/selftest/tests.py
index 6c844f7ab8..34991a4d9a 100755
--- a/source3/selftest/tests.py
+++ b/source3/selftest/tests.py
@@ -195,17 +195,17 @@ if sub.returncode == 0:
if t == "raw.chkpath":
plansmbtorturetestsuite(t, "dc", '//$SERVER_IP/tmpcase -U$USERNAME%$PASSWORD')
-test = 'rpc.lsa.lookupsids'
-transports = ["ncacn_np", "ncacn_ip_tcp" ]
-auth_options = ["ntlm", "spnego", "connect" ]
-signseal_options = ["", ",sign", ",sign,seal"]
-smb_options = ["", ",smb2"]
-endianness_options = ["", ",bigendian"]
-for t in transports:
- for z in smb_options:
- for e in endianness_options:
- for a in auth_options:
- for s in signseal_options:
- binding_string = "%s:$SERVER_IP[%s%s%s%s]" % (t, a, s, z, e)
- options = binding_string + " -U$USERNAME%$PASSWORD"
- plansmbtorturetestsuite(test, "dc", options, 'over %s with [%s%s%s%s] ' % (t, a, s, z, e))
+ test = 'rpc.lsa.lookupsids'
+ transports = ["ncacn_np", "ncacn_ip_tcp" ]
+ auth_options = ["ntlm", "spnego", "connect" ]
+ signseal_options = ["", ",sign", ",sign,seal"]
+ smb_options = ["", ",smb2"]
+ endianness_options = ["", ",bigendian"]
+ for t in transports:
+ for z in smb_options:
+ for e in endianness_options:
+ for a in auth_options:
+ for s in signseal_options:
+ binding_string = "%s:$SERVER_IP[%s%s%s%s]" % (t, a, s, z, e)
+ options = binding_string + " -U$USERNAME%$PASSWORD"
+ plansmbtorturetestsuite(test, "dc", options, 'over %s with [%s%s%s%s] ' % (t, a, s, z, e))